Skip to content

Commit 96077c5

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents b848841 + 67c5529 commit 96077c5

File tree

283 files changed

+4441
-2166
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

283 files changed

+4441
-2166
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1775,6 +1775,11 @@
17751775
"redirect_url": "/azure/site-recovery/failover-failback-overview-modernized",
17761776
"redirect_document_id": false
17771777
},
1778+
{
1779+
"source_path": "articles/site-recovery/vmware-physical-secondary-support-matrix.md",
1780+
"redirect_url": "/azure/site-recovery/vmware-physical-secondary-architecture",
1781+
"redirect_document_id": false
1782+
},
17781783
{
17791784
"source_path": "articles/site-recovery/switch-replication-appliance-preview.md",
17801785
"redirect_url": "/azure/site-recovery/switch-replication-appliance-modernized",
@@ -2518,6 +2523,11 @@
25182523
"redirect_url": "/azure/frontdoor/manager",
25192524
"redirect_document_id": false
25202525
},
2526+
{
2527+
"source_path_from_root": "/articles/frontdoor/standard-premium/faq.md",
2528+
"redirect_url": "/azure/frontdoor/front-door-faq",
2529+
"redirect_document_id": false
2530+
},
25212531
{
25222532
"source_path_from_root": "/articles/aks/aks-resource-health.md",
25232533
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ The following table lists the cookies used in Azure AD B2C.
4747
| `x-ms-cpim-ctx` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Context |
4848
| `x-ms-cpim-rp` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing membership data for the resource provider tenant. |
4949
| `x-ms-cpim-rc` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing the relay cookie. |
50+
| `x-ms-cpim-geo` | b2clogin.com, login.microsoftonline.com, branded domain | 1 Hour | Used as a hint to determine the resource tenants home geographic location. |
5051

5152
## Cross-Site request forgery token
5253

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Next, if one or more of the users that will need access to the application do no
4343
The following sections outline how to create extension attributes for a tenant with cloud only users, and for a tenant with Active Directory users.
4444

4545
## Create an extension attribute in a tenant with cloud only users
46-
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you do not have any users who need that attribute and originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
46+
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you have any users who need that attribute and do not originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
4747

4848
Once schema extensions are created, these extension attributes are automatically discovered when you next visit the provisioning page in the Azure portal, in most cases.
4949

@@ -82,7 +82,7 @@ Content-type: application/json
8282
"extension_inputAppId_extensionName": "extensionValue"
8383
}
8484
```
85-
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
85+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get). Note that the Graph v1.0 does not by default return any of a user's directory extension attributes, unless the attributes are specified in the request as one of the properties to return.
8686

8787
```json
8888
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ The following providers offer FIDO2 security keys of different form factors that
136136
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
137137
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |
138138
| [OneSpan Inc.](https://www.onespan.com/products/fido) | ![n] | ![y]| ![n]| ![y]| ![n] |
139-
| [PONE Biometrics](https://ponebiometrics.com/) | ![n] | ![n]| ![n]| ![y]| ![n] |
139+
| [PONE Biometrics](https://ponebiometrics.com/) | ![y] | ![n]| ![n]| ![y]| ![n] |
140140
| [Precision Biometric](https://www.innait.com/product/fido/) | ![n] | ![y]| ![n]| ![n]| ![n] |
141141
| [RSA](https://www.rsa.com/products/securid/) | ![n] | ![y]| ![n]| ![n]| ![n] |
142142
| [Sentry](https://sentryenterprises.com/) | ![n] | ![n]| ![y]| ![n]| ![n] |

articles/active-directory/authentication/concept-fido2-hardware-vendor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following table lists partners who are Microsoft-compatible FIDO2 security k
5757
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
5858
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |
5959
| [OneSpan Inc.](https://www.onespan.com/products/fido) | ![n] | ![y]| ![n]| ![y]| ![n] |
60-
| [PONE Biometrics](https://ponebiometrics.com/) | ![n] | ![n]| ![n]| ![y]| ![n] |
60+
| [PONE Biometrics](https://ponebiometrics.com/) | ![y] | ![n]| ![n]| ![y]| ![n] |
6161
| [Precision Biometric](https://www.innait.com/product/fido/) | ![n] | ![y]| ![n]| ![n]| ![n] |
6262
| [RSA](https://www.rsa.com/products/securid/) | ![n] | ![y]| ![n]| ![n]| ![n] |
6363
| [Sentry](https://sentryenterprises.com/) | ![n] | ![n]| ![y]| ![n]| ![n] |

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/22/2023
10+
ms.date: 08/31/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9999

100100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101101

102-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
102+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see the [Learn about the sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md) article.
103103

104104
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
105105

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: conditional-access
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
1010

11-
ms.date: 08/25/2023
11+
ms.date: 08/31/2023
1212

1313
ms.author: joflore
1414
author: MicrosoftGuyJFlo
@@ -185,7 +185,7 @@ User actions are tasks that can be performed by a user. Currently, Conditional A
185185

186186
## Traffic forwarding profiles
187187

188-
Traffic forwarding profiles in Global Secure Access enable administrators to define and control how traffic is routed through Microsoft Entra Internet Access and Microsoft Entra Private Access. Traffic forwarding profiles can be assigned to devices and remote networks. For an example of how to configure these traffic profiles in Conditional Access policy, see the article [How to require a compliant network check](../../global-secure-access/how-to-compliant-network.md).
188+
Traffic forwarding profiles in Global Secure Access enable administrators to define and control how traffic is routed through Microsoft Entra Internet Access and Microsoft Entra Private Access. Traffic forwarding profiles can be assigned to devices and remote networks. For an example of how to apply a Conditional Access policy to these traffic profiles, see the article [How to apply Conditional Access policies to the Microsoft 365 traffic profile](../../global-secure-access/how-to-target-resource-microsoft-365-profile.md).
189189

190190
For more information about these profiles, see the article [Global Secure Access traffic forwarding profiles](../../global-secure-access/concept-traffic-forwarding.md).
191191

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Create a risk-based Conditional Access policy that applies to service principals
7373
1. Set the **Configure** toggle to **Yes**.
7474
1. Select the levels of risk where you want this policy to trigger.
7575
1. Select **Done**.
76-
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
76+
1. Under **Grant**, **Block access** is the only available option. Access is blocked when the specified risk levels are seen.
7777
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
7878
1. Select **Create** to complete your policy.
7979

articles/active-directory/develop/authentication-national-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The following table lists the base URLs for the Azure AD endpoints used to regis
4646
You can find the authentication endpoints for your application.
4747

4848
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
49-
1. Browse to **Identity** > **Applications** > **Application registrations**.
49+
1. Browse to **Identity** > **Applications** > **App registrations**.
5050
1. Select **Endpoints** in the top menu.
5151

5252
The **Endpoints** page is displayed showing the authentication endpoints for the application.

articles/active-directory/develop/howto-call-a-web-api-with-curl.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Follow these steps to create the web API registration:
7272

7373
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
7474
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
75-
1. Browse to **Identity** > **Applications** > **Application registrations**.
75+
1. Browse to **Identity** > **Applications** > **App registrations**.
7676
1. Select **New registration**.
7777
1. Enter a **Name** for the application, such as *NewWebAPI1*.
7878
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select **Help me choose** option.
@@ -118,7 +118,7 @@ Follow these steps to create the web app registration:
118118

119119
::: zone pivot="no-api"
120120

121-
1. Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **Application registrations**.
121+
1. Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **App registrations**.
122122
1. Select **New registration**.
123123
1. Enter a **Name** for the application, such as `web-app-calls-web-api`.
124124
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
@@ -131,7 +131,7 @@ Follow these steps to create the web app registration:
131131

132132
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
133133
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
134-
1. Browse to **Identity** > **Applications** > **Application registrations**.
134+
1. Browse to **Identity** > **Applications** > **App registrations**.
135135
1. Select **New registration**.
136136
1. Enter a Name for the application, such as `web-app-calls-web-api`.
137137
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
@@ -258,7 +258,7 @@ The authorization code flow begins with the client directing the user to the `/a
258258
```
259259

260260
1. Copy the URL, replace the following parameters and paste it into your browser:
261-
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations**.
261+
- `{tenant_id}` is the web app **Directory (tenant) ID**.
262262
- `{web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web app's (*web-app-calls-web-api*) **Overview** pane.
263263
- `{web_API_application_client_id}` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane.
264264
1. Sign in as a user in the Azure AD tenant in which the apps are registered. Consent to any requests for access, if necessary.
@@ -283,7 +283,7 @@ cURL can now be used to request an access token from the Microsoft identity plat
283283
-d 'grant_type=authorization_code' \
284284
-d 'client_secret={client_secret}'
285285
```
286-
- `{tenant_id}` is the web app **Directory (tenant) ID**. This should be the same value across both of the applications's **Overview** pane **App registrations**.
286+
- `{tenant_id}` is the web app **Directory (tenant) ID**.
287287
- `client_id={web-app-calls-web-api_application_client_id}`, and `session_state={web-app-calls-web-api_application_client_id}` is the **Application (client) ID** on the web application's (*web-app-calls-web-api*) **Overview** pane.
288288
- `api://{web_API_application_client_id}/Forecast.Read` is the **Application (client) ID** on the web API's (*NewWebAPI1*) **Overview** pane.
289289
- `code={authorization_code}` is the authorization code that was received in [Request an authorization code](#request-an-authorization-code). This enables the cURL tool to request an access token.

0 commit comments

Comments
 (0)